2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
12 #include <afs/cellconfig.h>
13 #include <afs/ptserver.h>
27 #include "afsd_init.h"
28 #include <WINNT\afsreg.h>
46 /* Copied from afs_tokens.h */
47 #define PIOCTL_LOGON 0x1
50 const char utf8_prefix[] = UTF8_PREFIX;
51 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
53 osi_mutex_t cm_Afsdsbmt_Lock;
55 extern afs_int32 cryptall;
56 extern char cm_NetbiosName[];
57 extern clientchar_t cm_NetbiosNameC[];
59 extern void afsi_log(char *pattern, ...);
61 void cm_InitIoctl(void)
63 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock");
67 * Utility function. (Not currently in use.)
68 * This function forces all dirty buffers to the file server and
69 * then discards the status info.
72 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
76 code = buf_CleanVnode(scp, userp, reqp);
78 lock_ObtainWrite(&scp->rw);
79 cm_DiscardSCache(scp);
80 lock_ReleaseWrite(&scp->rw);
82 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
87 * Utility function. Used within this file.
88 * scp must be held but not locked.
91 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
95 #ifdef AFS_FREELANCE_CLIENT
96 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
97 cm_noteLocalMountPointChange();
102 code = buf_FlushCleanPages(scp, userp, reqp);
104 lock_ObtainWrite(&scp->rw);
105 cm_DiscardSCache(scp);
106 lock_ReleaseWrite(&scp->rw);
108 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
113 * Utility function. (Not currently in use)
114 * IoctlPath must be parsed or skipped prior to calling.
115 * scp must be held but not locked.
118 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
123 pscp = cm_FindSCacheParent(scp);
125 /* now flush the file */
126 code = cm_FlushFile(pscp, userp, reqp);
127 cm_ReleaseSCache(pscp);
133 * Utility function. Used within this function.
136 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
142 #ifdef AFS_FREELANCE_CLIENT
143 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
144 cm_noteLocalMountPointChange();
149 lock_ObtainWrite(&cm_scacheLock);
150 for (i=0; i<cm_data.scacheHashTableSize; i++) {
151 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
152 if (scp->fid.volume == volume && scp->fid.cell == cell) {
153 cm_HoldSCacheNoLock(scp);
154 lock_ReleaseWrite(&cm_scacheLock);
156 /* now flush the file */
157 code = cm_FlushFile(scp, userp, reqp);
158 lock_ObtainWrite(&cm_scacheLock);
159 cm_ReleaseSCacheNoLock(scp);
163 lock_ReleaseWrite(&cm_scacheLock);
169 * Utility function. Used within this file.
170 * Invalidate ACL info for a user that has just obtained or lost tokens.
173 cm_ResetACLCache(cm_user_t *userp)
178 lock_ObtainWrite(&cm_scacheLock);
179 for (hash=0; hash < cm_data.scacheHashTableSize; hash++) {
180 for (scp=cm_data.scacheHashTablep[hash]; scp; scp=scp->nextp) {
181 cm_HoldSCacheNoLock(scp);
182 lock_ReleaseWrite(&cm_scacheLock);
183 lock_ObtainWrite(&scp->rw);
184 cm_InvalidateACLUser(scp, userp);
185 lock_ReleaseWrite(&scp->rw);
186 lock_ObtainWrite(&cm_scacheLock);
187 cm_ReleaseSCacheNoLock(scp);
190 lock_ReleaseWrite(&cm_scacheLock);
194 * TranslateExtendedChars - This is a fix for TR 54482.
196 * If an extended character (80 - FF) is entered into a file
197 * or directory name in Windows, the character is translated
198 * into the OEM character map before being passed to us.
199 * The pioctl functions must match
200 * this translation for paths given via our own commands (like
201 * fs). If we do not do this, then we will try to perform an
202 * operation on a non-translated path, which we will fail to
203 * find, since the path was created with the translated chars.
204 * This function performs the required translation.
206 * OEM character code pages are used by the non-Unicode SMB
207 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
210 TranslateExtendedChars(char *str)
215 CharToOemA(str, str);
218 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
222 temp = strlen(ioctlp->inDatap) + 1;
223 ioctlp->inDatap += temp;
227 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
229 clientchar_t * rs = NULL;
232 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
234 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
235 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
239 /* Not a UTF-8 string */
240 if (smb_StoreAnsiFilenames) {
241 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
245 rs = malloc(cch * sizeof(clientchar_t));
246 cm_AnsiToClientString(instrp, -1, rs, cch);
248 cch = cm_OemToClientString(instrp, -1, NULL, 0);
252 rs = malloc(cch * sizeof(clientchar_t));
253 cm_OemToClientString(instrp, -1, rs, cch);
257 if (ext_instrp == NULL) {
258 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
263 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
265 const clientchar_t * cstr, int cchlen)
270 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
272 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
273 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
274 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp));
276 if (smb_StoreAnsiFilenames) {
277 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
279 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
282 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
284 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
289 if (cchout > 0 && ext_outp == NULL) {
290 ioctlp->outDatap += cchout;
297 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
299 cm_ioctlQueryOptions_t *
300 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
302 afs_uint32 pathlen = strlen(ioctlp->inDatap) + 1;
303 char *p = ioctlp->inDatap + pathlen;
304 cm_ioctlQueryOptions_t * optionsp = NULL;
306 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
307 optionsp = (cm_ioctlQueryOptions_t *)p;
308 if (optionsp->size < 12 /* minimum size of struct */)
316 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
317 * or any other time that ioctlp->inDatap points at the
318 * cm_ioctlQueryOptions_t object.
321 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
323 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
324 ioctlp->inDatap += optionsp->size;
327 /* format the specified path to look like "/afs/<cellname>/usr", by
328 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
329 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
330 * intentionally returned as "/afs/"--this makes submount manipulation
331 * easier (because we can always jump past the initial "/afs" to find
332 * the AFS path that should be written into afsdsbmt.ini).
335 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
338 clientchar_t bslash_mountRoot[256];
340 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
341 bslash_mountRoot[0] = '\\';
343 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
344 cm_ClientStrCpy(outpathp, cchlen, inpathp);
345 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
346 cm_ClientStrLen(bslash_mountRoot)))
347 cm_ClientStrCpy(outpathp, cchlen, inpathp);
348 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
349 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
350 else // inpathp looks like "<cell>/usr"
351 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
353 for (cp = outpathp; *cp != 0; ++cp) {
358 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
359 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
362 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
363 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
367 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
370 char bslash_mountRoot[256];
372 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
373 bslash_mountRoot[0] = '\\';
375 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
376 StringCbCopy(outpathp, outlen, inpathp);
377 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
378 StringCbCopy(outpathp, outlen, inpathp);
379 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
380 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
381 else // inpathp looks like "<cell>/usr"
382 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
384 for (cp = outpathp; *cp != 0; ++cp) {
389 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
390 outpathp[strlen(outpathp)-1] = 0;
393 if (!strcmpi (outpathp, cm_mountRoot)) {
394 StringCbCopy(outpathp, outlen, cm_mountRoot);
400 * VIOCGETAL internals.
402 * Assumes that pioctl path has been parsed or skipped.
403 * scp is held but not locked.
406 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
411 AFSFetchStatus fileStatus;
415 struct rx_connection * rxconnp;
417 /* now make the get acl call */
418 #ifdef AFS_FREELANCE_CLIENT
419 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
421 ioctlp->outDatap[0] ='\0';
425 afid.Volume = scp->fid.volume;
426 afid.Vnode = scp->fid.vnode;
427 afid.Unique = scp->fid.unique;
429 acl.AFSOpaque_val = ioctlp->outDatap;
430 acl.AFSOpaque_len = 0;
431 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
435 rxconnp = cm_GetRxConn(connp);
436 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
437 rx_PutConnection(rxconnp);
439 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
440 code = cm_MapRPCError(code, reqp);
445 /* skip over return data */
446 tlen = (int)strlen(ioctlp->outDatap) + 1;
447 ioctlp->outDatap += tlen;
449 /* and return success */
455 * VIOC_FILE_CELL_NAME internals.
457 * Assumes that pioctl path has been parsed or skipped.
458 * scp is held but not locked.
461 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
466 #ifdef AFS_FREELANCE_CLIENT
467 if ( cm_freelanceEnabled &&
468 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
469 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
470 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
471 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
472 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
475 #endif /* AFS_FREELANCE_CLIENT */
477 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
479 clientchar_t * cellname;
481 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
482 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
486 code = CM_ERROR_NOSUCHCELL;
494 * VIOCSETAL internals.
496 * Assumes that pioctl path has been parsed or skipped.
497 * scp is held but not locked.
500 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
505 AFSFetchStatus fileStatus;
508 struct rx_connection * rxconnp;
510 #ifdef AFS_FREELANCE_CLIENT
511 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
512 code = CM_ERROR_NOACCESS;
516 /* now make the get acl call */
517 fid.Volume = scp->fid.volume;
518 fid.Vnode = scp->fid.vnode;
519 fid.Unique = scp->fid.unique;
521 acl.AFSOpaque_val = ioctlp->inDatap;
522 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
523 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
527 rxconnp = cm_GetRxConn(connp);
528 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
529 rx_PutConnection(rxconnp);
531 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
532 code = cm_MapRPCError(code, reqp);
534 /* invalidate cache info, since we just trashed the ACL cache */
535 lock_ObtainWrite(&scp->rw);
536 cm_DiscardSCache(scp);
537 lock_ReleaseWrite(&scp->rw);
544 * VIOC_FLUSHALL internals.
546 * Assumes that pioctl path has been parsed or skipped.
549 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
555 lock_ObtainWrite(&cm_scacheLock);
556 for (i=0; i<cm_data.scacheHashTableSize; i++) {
557 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
558 cm_HoldSCacheNoLock(scp);
559 lock_ReleaseWrite(&cm_scacheLock);
561 /* now flush the file */
562 code = cm_FlushFile(scp, userp, reqp);
563 lock_ObtainWrite(&cm_scacheLock);
564 cm_ReleaseSCacheNoLock(scp);
567 lock_ReleaseWrite(&cm_scacheLock);
573 * VIOC_FLUSHVOLUME internals.
575 * Assumes that pioctl path has been parsed or skipped.
576 * scp is held but not locked.
579 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
585 #ifdef AFS_FREELANCE_CLIENT
586 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
587 code = CM_ERROR_NOACCESS;
591 volume = scp->fid.volume;
592 cell = scp->fid.cell;
593 code = cm_FlushVolume(userp, reqp, cell, volume);
599 * VIOCFLUSH internals.
601 * Assumes that pioctl path has been parsed or skipped.
602 * scp is held but not locked.
605 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
609 #ifdef AFS_FREELANCE_CLIENT
610 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
611 code = CM_ERROR_NOACCESS;
615 cm_FlushFile(scp, userp, reqp);
622 * VIOCSETVOLSTAT internals.
624 * Assumes that pioctl path has been parsed or skipped.
625 * scp is held but not locked.
628 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
632 char offLineMsg[256];
635 AFSFetchVolumeStatus volStat;
636 AFSStoreVolumeStatus storeStat;
641 struct rx_connection * rxconnp;
643 #ifdef AFS_FREELANCE_CLIENT
644 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
645 code = CM_ERROR_NOACCESS;
649 cellp = cm_FindCellByID(scp->fid.cell, 0);
650 osi_assertx(cellp, "null cm_cell_t");
652 if (scp->flags & CM_SCACHEFLAG_RO)
653 return CM_ERROR_READONLY;
655 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
656 CM_GETVOL_FLAG_CREATE, &tvp);
662 /* Copy the junk out, using cp as a roving pointer. */
663 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
664 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
666 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
667 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
670 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
671 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
674 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
675 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
681 if (volStat.MinQuota != -1) {
682 storeStat.MinQuota = volStat.MinQuota;
683 storeStat.Mask |= AFS_SETMINQUOTA;
685 if (volStat.MaxQuota != -1) {
686 storeStat.MaxQuota = volStat.MaxQuota;
687 storeStat.Mask |= AFS_SETMAXQUOTA;
691 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
695 rxconnp = cm_GetRxConn(tcp);
696 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
697 &storeStat, volName, offLineMsg, motd);
698 rx_PutConnection(rxconnp);
700 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
701 code = cm_MapRPCError(code, reqp);
704 /* return on failure */
708 /* we are sending parms back to make compat. with prev system. should
709 * change interface later to not ask for current status, just set
712 cp = ioctlp->outDatap;
713 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
714 cp += sizeof(VolumeStatus);
715 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
716 cp += strlen(volName)+1;
717 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
718 cp += strlen(offLineMsg)+1;
719 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
720 cp += strlen(motd)+1;
722 /* now return updated return data pointer */
723 ioctlp->outDatap = cp;
730 * VIOCGETVOLSTAT internals.
732 * Assumes that pioctl path has been parsed or skipped.
733 * scp is held but not locked.
736 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
739 char volName[32]="(unknown)";
740 char offLineMsg[256]="server temporarily inaccessible";
741 char motd[256]="server temporarily inaccessible";
743 AFSFetchVolumeStatus volStat;
748 struct rx_connection * rxconnp;
750 #ifdef AFS_FREELANCE_CLIENT
751 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
753 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
754 offLineMsg[0] = '\0';
755 strncpy(motd, "Freelance mode in use.", sizeof(motd));
756 volStat.Vid = scp->fid.volume;
757 volStat.MaxQuota = 0;
758 volStat.BlocksInUse = 100;
759 volStat.PartBlocksAvail = 0;
760 volStat.PartMaxBlocks = 100;
765 OfflineMsg = offLineMsg;
768 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
771 rxconnp = cm_GetRxConn(connp);
772 code = RXAFS_GetVolumeStatus(rxconnp, scp->fid.volume,
773 &volStat, &Name, &OfflineMsg, &MOTD);
774 rx_PutConnection(rxconnp);
776 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
777 code = cm_MapRPCError(code, reqp);
783 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
784 cp = ioctlp->outDatap;
785 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
786 cp += sizeof(AFSFetchVolumeStatus);
787 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
788 cp += strlen(volName)+1;
789 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
790 cp += strlen(offLineMsg)+1;
791 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
792 cp += strlen(motd)+1;
794 /* return new size */
795 ioctlp->outDatap = cp;
801 * VIOCGETFID internals.
803 * Assumes that pioctl path has been parsed or skipped.
804 * scp is held but not locked.
807 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
812 memset(&fid, 0, sizeof(cm_fid_t));
813 fid.cell = scp->fid.cell;
814 fid.volume = scp->fid.volume;
815 fid.vnode = scp->fid.vnode;
816 fid.unique = scp->fid.unique;
818 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
819 cp = ioctlp->outDatap;
820 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
821 cp += sizeof(cm_fid_t);
823 /* return new size */
824 ioctlp->outDatap = cp;
830 * VIOC_GETFILETYPE internals.
832 * Assumes that pioctl path has been parsed or skipped.
833 * scp is held but not locked.
836 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
840 afs_uint32 fileType = 0;
842 if (scp->fileType == 0) {
843 lock_ObtainWrite(&scp->rw);
844 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
845 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
847 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
848 lock_ReleaseWrite(&scp->rw);
852 fileType = scp->fileType;
854 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
855 cp = ioctlp->outDatap;
856 memcpy(cp, (char *)&fileType, sizeof(fileType));
857 cp += sizeof(fileType);
859 /* return new size */
860 ioctlp->outDatap = cp;
866 * VIOCGETOWNER internals.
868 * Assumes that pioctl path has been parsed or skipped.
869 * scp is held but not locked.
872 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
877 lock_ObtainWrite(&scp->rw);
878 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
879 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
881 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
882 lock_ReleaseWrite(&scp->rw);
885 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
886 cp = ioctlp->outDatap;
887 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
888 cp += sizeof(afs_uint32);
889 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
890 cp += sizeof(afs_uint32);
892 /* return new size */
893 ioctlp->outDatap = cp;
900 * VIOCWHEREIS internals.
902 * Assumes that pioctl path has been parsed or skipped.
903 * scp is held but not locked.
906 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
911 cm_serverRef_t **tsrpp, *current;
916 volume = scp->fid.volume;
918 cellp = cm_FindCellByID(scp->fid.cell, 0);
921 return CM_ERROR_NOSUCHCELL;
923 #ifdef AFS_FREELANCE_CLIENT
924 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
932 cp = ioctlp->outDatap;
934 memcpy(cp, (char *)&addr, sizeof(addr));
937 /* still room for terminating NULL, add it on */
939 memcpy(cp, (char *)&addr, sizeof(addr));
942 ioctlp->outDatap = cp;
946 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
950 cp = ioctlp->outDatap;
952 tsrpp = cm_GetVolServers(tvp, volume);
953 lock_ObtainRead(&cm_serverLock);
954 for (current = *tsrpp; current; current = current->next) {
955 tsp = current->server;
956 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
959 lock_ReleaseRead(&cm_serverLock);
960 cm_FreeServerList(tsrpp, 0);
962 /* still room for terminating NULL, add it on */
963 volume = 0; /* reuse vbl */
964 memcpy(cp, (char *)&volume, sizeof(long));
967 ioctlp->outDatap = cp;
974 * VIOC_AFS_STAT_MT_PT internals.
976 * Assumes that pioctl path has been parsed or skipped.
977 * scp is held but not locked.
980 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
986 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
987 code = cm_Lookup(dscp, cp, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
991 lock_ObtainWrite(&scp->rw);
992 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
993 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
995 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
999 /* now check that this is a real mount point */
1000 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1001 code = CM_ERROR_INVAL;
1005 code = cm_ReadMountPoint(scp, userp, reqp);
1008 strp = ioctlp->outDatap;
1009 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1010 strp += strlen(strp) + 1;
1011 ioctlp->outDatap = strp;
1015 lock_ReleaseWrite(&scp->rw);
1016 cm_ReleaseSCache(scp);
1026 * VIOC_AFS_DELETE_MT_PT internals.
1028 * Assumes that pioctl path has been parsed or skipped.
1029 * scp is held but not locked.
1032 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1036 clientchar_t *cp = NULL;
1037 fschar_t *originalName = NULL;
1040 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1042 code = cm_Lookup(dscp, cp, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1044 /* if something went wrong, bail out now */
1048 lock_ObtainWrite(&scp->rw);
1049 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1050 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1054 /* now check that this is a real mount point */
1055 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1056 code = CM_ERROR_INVAL;
1060 /* time to make the RPC, so drop the lock */
1061 lock_ReleaseWrite(&scp->rw);
1064 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
1066 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1067 /* The cm_Dir* functions can't be used to lookup the
1068 originalName. Those functions only know of the original
1070 cm_EndDirOp(&dirop);
1074 /* If this name doesn't have a non-normalized name associated with
1075 it, we assume that what we had is what is actually present on
1078 if (originalName == NULL) {
1079 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1082 /* cp is a normalized name. originalName is the actual name we
1083 saw on the fileserver. */
1084 #ifdef AFS_FREELANCE_CLIENT
1085 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1086 /* we are removing the mount point to the root dir., so call
1087 * the freelance code to do the deletion. */
1088 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1089 code = cm_FreelanceRemoveMount(originalName);
1093 /* easier to do it this way */
1094 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1096 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1097 smb_NotifyChange(FILE_ACTION_REMOVED,
1098 FILE_NOTIFY_CHANGE_DIR_NAME,
1099 dscp, cp, NULL, TRUE);
1101 lock_ObtainWrite(&scp->rw);
1103 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1106 cm_DiscardSCache(scp);
1107 lock_ReleaseWrite(&scp->rw);
1108 cm_ReleaseSCache(scp);
1111 if (originalName != NULL)
1121 * VIOCCKSERV internals.
1123 * Assumes that pioctl path has been parsed or skipped.
1126 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1136 tp = ioctlp->inDatap;
1139 memcpy(&temp, tp, sizeof(temp));
1140 if (temp == 0x12345678) { /* For afs3.3 version */
1141 memcpy(&csi, tp, sizeof(csi));
1142 if (csi.tinterval >= 0) {
1143 cp = ioctlp->outDatap;
1144 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1145 ioctlp->outDatap += sizeof(long);
1146 if (csi.tinterval > 0) {
1147 if (!smb_SUser(userp))
1148 return CM_ERROR_NOACCESS;
1149 cm_daemonCheckDownInterval = csi.tinterval;
1157 } else { /* For pre afs3.3 versions */
1158 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1159 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1160 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1165 * 1: fast check, don't contact servers.
1166 * 2: local cell only.
1169 /* have cell name, too */
1170 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1172 return CM_ERROR_NOSUCHCELL;
1175 cellp = (cm_cell_t *) 0;
1176 if (!cellp && (temp & 2)) {
1177 /* use local cell */
1178 fschar_t wscell[CELL_MAXNAMELEN+1];
1179 cm_GetRootCellName(wscell);
1180 cellp = cm_GetCell(wscell, 0);
1182 if (!(temp & 1)) { /* if not fast, call server checker routine */
1183 /* check down servers */
1184 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1187 /* now return the current down server list */
1188 cp = ioctlp->outDatap;
1189 lock_ObtainRead(&cm_serverLock);
1190 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1191 if (cellp && tsp->cellp != cellp)
1192 continue; /* cell spec'd and wrong */
1193 if ((tsp->flags & CM_SERVERFLAG_DOWN)
1194 && tsp->type == CM_SERVER_FILE) {
1195 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1199 lock_ReleaseRead(&cm_serverLock);
1201 ioctlp->outDatap = cp;
1206 * VIOCCKBACK internals.
1208 * Assumes that pioctl path has been parsed or skipped.
1211 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1213 cm_RefreshVolumes();
1218 * VIOCSETCACHESIZE internals.
1220 * Assumes that pioctl path has been parsed or skipped.
1222 * This function is no longer meaningful in the current day world
1223 * of persistent caches. The buf_SetNBuffers() function will
1227 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1232 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1234 temp = cm_data.buf_nOrigBuffers;
1236 /* temp is in 1K units, convert to # of buffers */
1237 temp = temp / (cm_data.buf_blockSize / 1024);
1240 /* now adjust the cache size */
1241 code = buf_SetNBuffers(temp);
1247 * VIOC_TRACECTL internals.
1249 * Assumes that pioctl path has been parsed or skipped.
1252 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1256 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1260 afsd_ForceTrace(FALSE);
1261 buf_ForceTrace(FALSE);
1265 /* set tracing value to low order bit */
1266 if ((inValue & 1) == 0) {
1267 /* disable tracing */
1268 osi_LogDisable(afsd_logp);
1269 rx_DebugOnOff(FALSE);
1272 /* enable tracing */
1273 osi_LogEnable(afsd_logp);
1274 rx_DebugOnOff(TRUE);
1278 /* see if we're supposed to do a reset, too */
1280 osi_LogReset(afsd_logp);
1283 /* and copy out tracing flag */
1284 inValue = afsd_logp->enabled; /* use as a temp vbl */
1285 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1286 ioctlp->outDatap += sizeof(afs_uint32);
1291 * VIOCGETCACHEPARMS internals.
1293 * Assumes that pioctl path has been parsed or skipped.
1296 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1298 cm_cacheParms_t parms;
1300 memset(&parms, 0, sizeof(parms));
1302 /* first we get, in 1K units, the cache size */
1303 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1305 /* and then the actual # of buffers in use (not in the free list, I guess,
1306 * will be what we do).
1308 parms.parms[1] = (cm_data.buf_nbuffers - buf_CountFreeList()) * (cm_data.buf_blockSize / 1024);
1310 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1311 ioctlp->outDatap += sizeof(parms);
1317 * VIOCGETCELL internals.
1319 * Assumes that pioctl path has been parsed or skipped.
1322 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1327 cm_serverRef_t *serverRefp;
1328 cm_server_t *serverp;
1334 tp = ioctlp->inDatap;
1336 memcpy((char *)&whichCell, tp, sizeof(long));
1339 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1340 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1341 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1344 lock_ObtainRead(&cm_cellLock);
1345 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1350 lock_ReleaseRead(&cm_cellLock);
1353 clientchar_t * cellnamep;
1355 cp = ioctlp->outDatap;
1357 if (magic == 0x12345678) {
1358 memcpy(cp, (char *)&magic, sizeof(long));
1361 memset(cp, 0, max * sizeof(long));
1363 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1364 for (i=0, serverRefp = tcellp->vlServersp;
1365 serverRefp && i<max;
1366 i++, serverRefp = serverRefp->next) {
1367 serverp = serverRefp->server;
1368 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1371 lock_ReleaseRead(&cm_serverLock);
1372 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1374 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1375 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1382 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1387 * VIOCNEWCELL internals.
1389 * Assumes that pioctl path has been parsed or skipped.
1392 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1395 * All that needs to be done is to refresh server information for all cells that
1396 * are already loaded.
1398 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1402 cm_cell_rock_t rock;
1404 lock_ObtainWrite(&cm_cellLock);
1406 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1409 lock_ObtainMutex(&cp->mx);
1410 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1411 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1412 cp->vlServersp = NULL;
1415 code = cm_SearchCellFile(cp->name, cp->name, cm_AddCellProc, &rock);
1416 #ifdef AFS_AFSDB_ENV
1418 if (cm_dnsEnabled) {
1420 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1421 if ( code == 0 ) { /* got cell from DNS */
1422 cp->flags |= CM_CELLFLAG_DNS;
1423 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1424 cp->timeout = time(0) + ttl;
1429 cp->flags &= ~CM_CELLFLAG_DNS;
1431 #endif /* AFS_AFSDB_ENV */
1433 cp->flags |= CM_CELLFLAG_VLSERVER_INVALID;
1436 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1437 cm_RandomizeServer(&cp->vlServersp);
1439 lock_ReleaseMutex(&cp->mx);
1442 lock_ReleaseWrite(&cm_cellLock);
1447 * VIOC_GET_WS_CELL internals.
1449 * Assumes that pioctl path has been parsed or skipped.
1452 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1456 if (cm_freelanceEnabled) {
1457 if (cm_GetRootCellName(ioctlp->outDatap))
1458 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1459 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1460 } else if (cm_data.rootCellp) {
1461 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1462 /* return the default cellname to the caller */
1463 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1466 /* if we don't know our default cell, return failure */
1467 code = CM_ERROR_NOSUCHCELL;
1474 * VIOC_AFS_SYSNAME internals.
1476 * Assumes that pioctl path has been parsed or skipped.
1479 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1481 afs_uint32 setSysName;
1483 clientchar_t *inname = NULL;
1486 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1487 ioctlp->inDatap += sizeof(afs_uint32);
1491 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1493 cp2 = ioctlp->inDatap;
1494 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1495 /* won't go past end of ioctlp->inDatap since
1496 maxsysname*num < ioctlp->inDatap length */
1497 t = (int)strlen(cp);
1498 if (t >= MAXSYSNAME || t <= 0)
1500 /* check for names that can shoot us in the foot */
1501 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1507 /* inname gets first entry in case we're being a translator */
1508 /* (we are never a translator) */
1509 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1512 /* Not xlating, so local case */
1514 osi_panic("cm_IoctlSysName: !cm_sysName\n", __FILE__, __LINE__);
1517 /* Local guy; only root can change sysname */
1518 /* clear @sys entries from the dnlc, once afs_lookup can
1519 * do lookups of @sys entries and thinks it can trust them */
1520 /* privs ok, store the entry, ... */
1522 cm_ClientStrCpy(cm_sysName, lengthof(cm_sysName), inname);
1523 cm_ClientStrCpy(cm_sysNameList[0], MAXSYSNAME, inname);
1525 if (setSysName > 1) { /* ... or list */
1526 for (count = 1; count < setSysName; ++count) {
1527 clientchar_t * newsysname;
1529 if (!cm_sysNameList[count])
1530 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1531 __FILE__, __LINE__);
1533 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1534 cm_ClientStrCpy(cm_sysNameList[count], MAXSYSNAME, newsysname);
1538 cm_sysNameCount = setSysName;
1542 /* return the sysname to the caller */
1543 i32 = cm_sysNameCount;
1544 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1545 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1547 if (cm_sysNameCount) {
1548 for ( count=0; count < cm_sysNameCount ; ++count) { /* ... or list */
1549 if ( !cm_sysNameList[count] || *cm_sysNameList[count] == _C('\0'))
1550 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1551 __FILE__, __LINE__);
1552 cm_UnparseIoctlString(ioctlp, NULL, cm_sysNameList[count], -1);
1567 * VIOC_GETCELLSTATUS internals.
1569 * Assumes that pioctl path has been parsed or skipped.
1572 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1576 clientchar_t * cellnamep;
1577 fschar_t * fscellnamep;
1579 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1580 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1581 cellp = cm_GetCell(fscellnamep, 0);
1586 return CM_ERROR_NOSUCHCELL;
1589 lock_ObtainMutex(&cellp->mx);
1590 if (cellp->flags & CM_CELLFLAG_SUID)
1591 temp |= CM_SETCELLFLAG_SUID;
1592 lock_ReleaseMutex(&cellp->mx);
1594 /* now copy out parm */
1595 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1596 ioctlp->outDatap += sizeof(afs_uint32);
1602 * VIOC_SETCELLSTATUS internals.
1604 * Assumes that pioctl path has been parsed or skipped.
1607 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1612 fschar_t * cellnamep;
1614 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1615 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1616 cellp = cm_GetCell(cellnamep, 0);
1621 return CM_ERROR_NOSUCHCELL;
1623 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1625 lock_ObtainMutex(&cellp->mx);
1626 if (flags & CM_SETCELLFLAG_SUID)
1627 cellp->flags |= CM_CELLFLAG_SUID;
1629 cellp->flags &= ~CM_CELLFLAG_SUID;
1630 lock_ReleaseMutex(&cellp->mx);
1636 * VIOC_SETSPREFS internals.
1638 * Assumes that pioctl path has been parsed or skipped.
1641 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1643 cm_SSetPref_t *spin; /* input */
1644 cm_SPref_t *srvin; /* one input component */
1646 int i, vlonly, noServers, type;
1647 struct sockaddr_in tmp;
1648 unsigned short rank;
1650 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1651 noServers = spin->num_servers;
1652 vlonly = spin->flags;
1654 type = CM_SERVER_VLDB;
1656 type = CM_SERVER_FILE;
1658 for ( i=0; i < noServers; i++)
1660 srvin = &(spin->servers[i]);
1661 rank = srvin->rank + (rand() & 0x000f);
1662 tmp.sin_addr = srvin->host;
1663 tmp.sin_family = AF_INET;
1665 tsp = cm_FindServer(&tmp, type);
1666 if ( tsp ) /* an existing server - ref count increased */
1668 tsp->ipRank = rank; /* no need to protect by mutex*/
1670 if (type == CM_SERVER_FILE)
1672 /* find volumes which might have RO copy
1673 /* on server and change the ordering of
1676 cm_ChangeRankVolume(tsp);
1680 /* set preferences for an existing vlserver */
1681 cm_ChangeRankCellVLServer(tsp);
1684 else /* add a new server without a cell */
1686 tsp = cm_NewServer(&tmp, type, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1689 lock_ObtainMutex(&tsp->mx);
1690 tsp->flags |= CM_SERVERFLAG_PREF_SET;
1691 lock_ReleaseMutex(&tsp->mx);
1692 cm_PutServer(tsp); /* decrease refcount */
1698 * VIOC_GETSPREFS internals.
1700 * Assumes that pioctl path has been parsed or skipped.
1703 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1705 cm_SPrefRequest_t *spin; /* input */
1706 cm_SPrefInfo_t *spout; /* output */
1707 cm_SPref_t *srvout; /* one output component */
1709 int i, vlonly, noServers;
1711 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1712 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1713 srvout = spout->servers;
1714 noServers = spin->num_servers;
1715 vlonly = spin->flags & CM_SPREF_VLONLY;
1716 spout->num_servers = 0;
1718 lock_ObtainRead(&cm_serverLock); /* get server lock */
1720 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
1721 if (spin->offset > i) {
1722 continue; /* catch up to where we left off */
1725 if ( vlonly && (tsp->type == CM_SERVER_FILE) )
1726 continue; /* ignore fileserver for -vlserver option*/
1727 if ( !vlonly && (tsp->type == CM_SERVER_VLDB) )
1728 continue; /* ignore vlservers */
1730 srvout->host = tsp->addr.sin_addr;
1731 srvout->rank = tsp->ipRank;
1733 spout->num_servers++;
1736 lock_ReleaseRead(&cm_serverLock); /* release server lock */
1738 if ( tsp ) /* we ran out of space in the output buffer */
1739 spout->next_offset = i;
1741 spout->next_offset = 0;
1742 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
1743 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
1749 * VIOC_AFS_CREATE_MT_PT internals.
1751 * Assumes that pioctl path has been parsed or skipped.
1752 * dscp is held but not locked.
1755 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1760 fschar_t mpInfo[512]; /* mount point string */
1761 fschar_t fullCell[MAXCELLCHARS];
1762 fschar_t *fscell = NULL;
1763 fschar_t *fsvolume = NULL;
1764 clientchar_t volume[VL_MAXNAMELEN];
1765 clientchar_t *mpp = NULL;
1766 clientchar_t *cell = NULL;
1767 cm_volume_t *volp = NULL;
1768 cm_cell_t *cellp = NULL;
1771 * The fs command allows the user to specify partial cell names on NT. These must
1772 * be expanded to the full cell name for mount points so that the mount points will
1773 * work on UNIX clients.
1776 /* Extract the possibly partial cell name */
1777 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1778 cell = cm_ClientCharNext(mpp);
1779 if (cp = cm_ClientStrChr(cell, ':')) {
1781 /* Extract the volume name */
1783 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
1785 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1786 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
1788 /* Get the full name for this cell */
1789 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
1791 code = CM_ERROR_NOSUCHCELL;
1795 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
1796 fullCell, fsvolume);
1799 /* No cell name specified, so cell points at the volume instead. */
1800 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1801 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
1802 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
1805 /* validate the target info */
1806 if (cm_VolNameIsID(fsvolume)) {
1807 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
1808 CM_GETVOL_FLAG_CREATE, &volp);
1810 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
1811 CM_GETVOL_FLAG_CREATE, &volp);
1816 #ifdef AFS_FREELANCE_CLIENT
1817 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1818 /* we are adding the mount point to the root dir, so call
1819 * the freelance code to do the add. */
1820 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1821 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
1822 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
1827 /* create the symlink with mode 644. The lack of X bits tells
1828 * us that it is a mount point.
1830 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
1831 tattr.unixModeBits = 0644;
1832 tattr.clientModTime = time(NULL);
1834 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp);
1837 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1838 smb_NotifyChange(FILE_ACTION_ADDED,
1839 FILE_NOTIFY_CHANGE_DIR_NAME,
1840 dscp, leaf, NULL, TRUE);
1856 * VIOC_SYMLINK internals.
1858 * Assumes that pioctl path has been parsed or skipped.
1859 * dscp is held but not locked.
1862 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1868 int free_syml = FALSE;
1870 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1871 /* Translate chars for the linked to name */
1872 TranslateExtendedChars(ioctlp->inDatap);
1875 cp = symlp = ioctlp->inDatap; /* contents of link */
1877 #ifdef AFS_FREELANCE_CLIENT
1878 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1879 /* we are adding the symlink to the root dir., so call
1880 * the freelance code to do the add. */
1883 if (cp[0] == cp[1] && cp[1] == '\\' &&
1884 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
1886 /* skip \\AFS\ or \\AFS\all\ */
1888 p = cp + 2 + strlen(cm_NetbiosName) + 1;
1889 if ( !_strnicmp("all", p, 3) )
1894 osi_Log0(afsd_logp,"IoctlCreateSymlink within Freelance root dir");
1895 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1896 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
1901 /* Create symlink with mode 0755. */
1902 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
1903 tattr.unixModeBits = 0755;
1905 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp);
1908 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1909 smb_NotifyChange(FILE_ACTION_ADDED,
1910 FILE_NOTIFY_CHANGE_FILE_NAME
1911 | FILE_NOTIFY_CHANGE_DIR_NAME,
1912 dscp, leaf, NULL, TRUE);
1918 * VIOC_LISTSYMLINK internals.
1920 * Assumes that pioctl path has been parsed or skipped.
1921 * dscp is held but not locked.
1924 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1930 cm_scache_t *newRootScp;
1931 clientchar_t *clientp;
1933 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1934 /* Translate chars for the link name */
1935 TranslateExtendedChars(ioctlp->inDatap);
1937 cp = ioctlp->inDatap;
1939 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
1940 code = cm_Lookup(dscp, clientp, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1945 /* Check that it's a real symlink */
1946 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
1947 scp->fileType != CM_SCACHETYPE_DFSLINK &&
1948 scp->fileType != CM_SCACHETYPE_INVALID) {
1949 cm_ReleaseSCache(scp);
1950 return CM_ERROR_INVAL;
1953 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
1954 cm_ReleaseSCache(scp);
1956 cp = ioctlp->outDatap;
1957 if (newRootScp != NULL) {
1958 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
1959 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
1962 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), spacep->data);
1963 cp += strlen(cp) + 1;
1964 ioctlp->outDatap = cp;
1965 cm_FreeSpace(spacep);
1966 if (newRootScp != NULL)
1967 cm_ReleaseSCache(newRootScp);
1969 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
1970 scp->fileType == CM_SCACHETYPE_DFSLINK ||
1971 code == CM_ERROR_NOSUCHPATH &&
1972 scp->fileType == CM_SCACHETYPE_INVALID) {
1974 cp = ioctlp->outDatap;
1975 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
1976 cp += strlen(cp) + 1;
1977 ioctlp->outDatap = cp;
1985 * VIOC_ISSYMLINK internals.
1987 * Assumes that pioctl path has been parsed or skipped.
1988 * dscp is held but not locked.
1991 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1992 {/*CHECK FOR VALID SYMLINK*/
1996 clientchar_t *clientp;
1998 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1999 /* Translate chars for the link name */
2000 TranslateExtendedChars(ioctlp->inDatap);
2002 cp = ioctlp->inDatap;
2003 osi_LogEvent("cm_IoctlListlink",NULL," name[%s]",cp);
2005 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2006 code = cm_Lookup(dscp, clientp, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2011 /* Check that it's a real symlink */
2012 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2013 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2014 scp->fileType != CM_SCACHETYPE_INVALID)
2015 code = CM_ERROR_INVAL;
2016 cm_ReleaseSCache(scp);
2021 * VIOC_DELSYMLINK internals.
2023 * Assumes that pioctl path has been parsed or skipped.
2024 * dscp is held but not locked.
2027 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2032 char * originalName = NULL;
2034 clientchar_t *clientp;
2036 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2037 /* Translate chars for the link name */
2038 TranslateExtendedChars(ioctlp->inDatap);
2040 cp = ioctlp->inDatap;
2042 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2043 code = cm_Lookup(dscp, clientp, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2045 /* if something went wrong, bail out now */
2049 lock_ObtainWrite(&scp->rw);
2050 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2051 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2055 /* now check that this is a real symlink */
2056 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2057 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2058 scp->fileType != CM_SCACHETYPE_INVALID) {
2059 code = CM_ERROR_INVAL;
2063 /* time to make the RPC, so drop the lock */
2064 lock_ReleaseWrite(&scp->rw);
2067 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
2069 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2070 /* cm_Dir*() functions can't be used to lookup the original
2071 name since those functions only know of the original
2073 cm_EndDirOp(&dirop);
2077 /* If this name doesn't have a non-normalized name associated with
2078 it, we assume that what we had is what is actually present on
2081 if (originalName == NULL)
2084 /* cp is a normalized name. originalName is the actual name we
2085 saw on the fileserver. */
2088 #ifdef AFS_FREELANCE_CLIENT
2089 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2090 /* we are adding the mount point to the root dir., so call
2091 * the freelance code to do the add. */
2092 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2093 code = cm_FreelanceRemoveSymlink(originalName);
2097 /* easier to do it this way */
2098 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2100 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2101 smb_NotifyChange(FILE_ACTION_REMOVED,
2102 FILE_NOTIFY_CHANGE_FILE_NAME
2103 | FILE_NOTIFY_CHANGE_DIR_NAME,
2104 dscp, clientp, NULL, TRUE);
2106 if (originalName != NULL && originalName != cp) {
2108 originalName = NULL;
2111 lock_ObtainWrite(&scp->rw);
2113 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2116 cm_DiscardSCache(scp);
2117 lock_ReleaseWrite(&scp->rw);
2118 cm_ReleaseSCache(scp);
2127 /* Utility function. Not currently used.
2128 * This function performs a PTS lookup which has traditionally
2129 * not been performed by the cache manager.
2132 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2137 static struct afsconf_cell info;
2138 struct rx_connection *serverconns[MAXSERVERS];
2139 struct rx_securityClass *sc[3];
2140 afs_int32 scIndex = 2; /* authenticated - we have a token */
2141 struct ubik_client *pruclient = NULL;
2142 struct afsconf_dir *tdir;
2146 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2147 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2148 afsconf_Close(tdir);
2154 /* we have the token that was given to us in the settoken
2155 * call. we just have to use it.
2157 scIndex = 2; /* kerberos ticket */
2158 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2159 ucellp->kvno, ucellp->ticketLen,
2162 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2163 for (i = 0; i < info.numServers; i++)
2165 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2166 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2169 code = ubik_ClientInit(serverconns, &pruclient);
2174 code = rxs_Release(sc[scIndex]);
2176 lids.idlist_len = 0;
2177 lids.idlist_val = 0;
2178 lnames.namelist_len = 1;
2179 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2180 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2181 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2182 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2188 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2191 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2192 if (lids.idlist_val) {
2193 *uid = *lids.idlist_val;
2194 free(lids.idlist_val);
2196 if (lnames.namelist_val)
2197 free(lnames.namelist_val);
2200 ubik_ClientDestroy(pruclient);
2206 #endif /* QUERY_AFSID */
2209 /* This has been copied to smb_IoctlSetToken in its entirety.
2210 * An equivalent version will need to be produced for the
2211 * redirector and some extensive refactoring might be required.
2214 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2221 struct ClearToken ct;
2229 int release_userp = 0;
2232 saveDataPtr = ioctlp->inDatap;
2234 cm_SkipIoctlPath(ioctlp);
2236 tp = ioctlp->inDatap;
2239 memcpy(&ticketLen, tp, sizeof(ticketLen));
2240 tp += sizeof(ticketLen);
2241 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2242 return CM_ERROR_INVAL;
2244 /* remember ticket and skip over it for now */
2248 /* clear token size */
2249 memcpy(&ctSize, tp, sizeof(ctSize));
2250 tp += sizeof(ctSize);
2251 if (ctSize != sizeof(struct ClearToken))
2252 return CM_ERROR_INVAL;
2255 memcpy(&ct, tp, ctSize);
2257 if (ct.AuthHandle == -1)
2258 ct.AuthHandle = 999; /* more rxvab compat stuff */
2260 /* more stuff, if any */
2261 if (ioctlp->inCopied > tp - saveDataPtr) {
2262 /* flags: logon flag */
2263 memcpy(&flags, tp, sizeof(int));
2267 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2269 return CM_ERROR_NOSUCHCELL;
2270 tp += strlen(tp) + 1;
2274 tp += strlen(tp) + 1;
2276 if (flags & PIOCTL_LOGON) {
2277 /* SMB user name with which to associate tokens */
2279 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2280 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2281 fprintf(stderr, "SMB name = %s\n", smbname);
2282 tp += strlen(tp) + 1;
2284 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2285 osi_LogSaveString(smb_logp, uname));
2289 memcpy(&uuid, tp, sizeof(uuid));
2290 if (!cm_FindTokenEvent(uuid, sessionKey))
2291 return CM_ERROR_INVAL;
2293 cellp = cm_data.rootCellp;
2294 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2297 if (flags & PIOCTL_LOGON) {
2298 userp = smb_FindCMUserByName(smbname, ioctlp->fidp->vcp->rname,
2299 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2303 /* store the token */
2304 lock_ObtainMutex(&userp->mx);
2305 ucellp = cm_GetUCell(userp, cellp);
2306 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2307 ucellp->ticketLen = ticketLen;
2308 if (ucellp->ticketp)
2309 free(ucellp->ticketp); /* Discard old token if any */
2310 ucellp->ticketp = malloc(ticketLen);
2311 memcpy(ucellp->ticketp, ticket, ticketLen);
2313 * Get the session key from the RPC, rather than from the pioctl.
2316 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2318 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2319 ucellp->kvno = ct.AuthHandle;
2320 ucellp->expirationTime = ct.EndTimestamp;
2323 ucellp->uid = ANONYMOUSID;
2326 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2328 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2331 ucellp->flags |= CM_UCELLFLAG_RXKAD;
2332 lock_ReleaseMutex(&userp->mx);
2334 if (flags & PIOCTL_LOGON) {
2335 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2338 cm_ResetACLCache(userp);
2341 cm_ReleaseUser(userp);
2348 * VIOC_GETTOK internals.
2350 * Assumes that pioctl path has been parsed or skipped.
2353 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2359 struct ClearToken ct;
2361 tp = ioctlp->inDatap;
2362 cp = ioctlp->outDatap;
2365 memcpy(&iterator, tp, sizeof(iterator));
2366 tp += sizeof(iterator);
2368 lock_ObtainMutex(&userp->mx);
2370 /* look for token */
2371 for (;;iterator++) {
2372 ucellp = cm_FindUCell(userp, iterator);
2374 lock_ReleaseMutex(&userp->mx);
2375 return CM_ERROR_NOMORETOKENS;
2377 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2382 temp = ucellp->iterator + 1;
2383 memcpy(cp, &temp, sizeof(temp));
2387 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2388 cp += sizeof(ucellp->ticketLen);
2391 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2392 cp += ucellp->ticketLen;
2394 /* clear token size */
2396 memcpy(cp, &temp, sizeof(temp));
2400 ct.AuthHandle = ucellp->kvno;
2403 * This field is supposed to hold the session key
2404 * but we don't want to make it easier for someone
2405 * to attack the cache. The user gave us the session
2406 * key in the first place.
2408 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2409 ct.ViceId = 37; /* XXX */
2410 ct.BeginTimestamp = 0; /* XXX */
2411 ct.EndTimestamp = ucellp->expirationTime;
2412 memcpy(cp, &ct, sizeof(ct));
2415 /* Primary flag (unused) */
2417 memcpy(cp, &temp, sizeof(temp));
2421 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2422 cp += strlen(cp) + 1;
2425 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2426 cp += strlen(cp) + 1;
2428 ioctlp->outDatap = cp;
2430 lock_ReleaseMutex(&userp->mx);
2436 * VIOC_NEWGETTOK internals.
2438 * Assumes that pioctl path has been parsed or skipped.
2441 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2447 struct ClearToken ct;
2451 tp = ioctlp->inDatap;
2453 cp = ioctlp->outDatap;
2455 /* cell name is right here */
2456 cellp = cm_GetCell(tp, 0);
2458 return CM_ERROR_NOSUCHCELL;
2459 tp += strlen(tp) + 1;
2462 memcpy(&uuid, tp, sizeof(uuid));
2464 lock_ObtainMutex(&userp->mx);
2466 ucellp = cm_GetUCell(userp, cellp);
2467 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2468 lock_ReleaseMutex(&userp->mx);
2469 return CM_ERROR_NOMORETOKENS;
2473 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2474 cp += sizeof(ucellp->ticketLen);
2477 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2478 cp += ucellp->ticketLen;
2480 /* clear token size */
2482 memcpy(cp, &temp, sizeof(temp));
2486 ct.AuthHandle = ucellp->kvno;
2488 /* do not give out the session key */
2489 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2490 ct.ViceId = 37; /* XXX */
2491 ct.BeginTimestamp = 0; /* XXX */
2492 ct.EndTimestamp = ucellp->expirationTime;
2493 memcpy(cp, &ct, sizeof(ct));
2496 /* Primary flag (unused) */
2498 memcpy(cp, &temp, sizeof(temp));
2502 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2503 cp += strlen(cp) + 1;
2506 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2507 cp += strlen(cp) + 1;
2509 ioctlp->outDatap = cp;
2511 lock_ReleaseMutex(&userp->mx);
2513 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data);
2519 * VIOCDELTOK internals.
2521 * Assumes that pioctl path has been parsed or skipped.
2524 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2530 cp = ioctlp->outDatap;
2532 /* cell name is right here */
2533 cellp = cm_GetCell(ioctlp->inDatap, 0);
2535 return CM_ERROR_NOSUCHCELL;
2537 lock_ObtainMutex(&userp->mx);
2539 ucellp = cm_GetUCell(userp, cellp);
2541 lock_ReleaseMutex(&userp->mx);
2542 return CM_ERROR_NOMORETOKENS;
2545 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2547 if (ucellp->ticketp) {
2548 free(ucellp->ticketp);
2549 ucellp->ticketp = NULL;
2551 ucellp->ticketLen = 0;
2552 memset(ucellp->sessionKey.data, 0, 8);
2554 ucellp->expirationTime = 0;
2555 ucellp->userName[0] = '\0';
2556 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2559 lock_ReleaseMutex(&userp->mx);
2561 cm_ResetACLCache(userp);
2567 * VIOCDELALLTOK internals.
2569 * Assumes that pioctl path has been parsed or skipped.
2572 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2576 lock_ObtainMutex(&userp->mx);
2578 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2579 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2581 if (ucellp->ticketp) {
2582 free(ucellp->ticketp);
2583 ucellp->ticketp = NULL;
2585 ucellp->ticketLen = 0;
2586 memset(ucellp->sessionKey.data, 0, 8);
2588 ucellp->expirationTime = 0;
2589 ucellp->userName[0] = '\0';
2590 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2594 lock_ReleaseMutex(&userp->mx);
2596 cm_ResetACLCache(userp);
2602 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2604 * Assumes that pioctl path has been parsed or skipped.
2607 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2609 char afspath[MAX_PATH];
2611 int nextAutoSubmount;
2613 DWORD dwType, dwSize;
2618 /* Serialize this one, to prevent simultaneous mods
2621 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2623 /* Parse the input parameters--first the required afs path,
2624 * then the requested submount name (which may be "").
2626 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2627 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2629 /* If the caller supplied a suggested submount name, see if
2630 * that submount name is in use... if so, the submount's path
2631 * has to match our path.
2634 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2635 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2638 REG_OPTION_NON_VOLATILE,
2639 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2644 if (submountreqp && *submountreqp) {
2645 char submountPath[MAX_PATH];
2647 dwSize = sizeof(submountPath);
2648 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2649 &dwType, submountPath, &dwSize);
2651 if (status != ERROR_SUCCESS) {
2653 /* The suggested submount name isn't in use now--
2654 * so we can safely map the requested submount name
2655 * to the supplied path. Remember not to write the
2656 * leading "/afs" when writing out the submount.
2658 RegSetValueEx( hkSubmounts, submountreqp, 0,
2660 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2661 &afspath[strlen(cm_mountRoot)]:"/",
2662 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2663 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2665 RegCloseKey( hkSubmounts );
2666 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2667 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2668 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2672 /* The suggested submount name is already in use--if the
2673 * supplied path matches the submount's path, we can still
2674 * use the suggested submount name.
2676 if (!strcmp (submountPath, afspath)) {
2677 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2678 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2679 RegCloseKey( hkSubmounts );
2680 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2685 RegQueryInfoKey( hkSubmounts,
2687 NULL, /* lpcClass */
2688 NULL, /* lpReserved */
2689 NULL, /* lpcSubKeys */
2690 NULL, /* lpcMaxSubKeyLen */
2691 NULL, /* lpcMaxClassLen */
2692 &dwSubmounts, /* lpcValues */
2693 NULL, /* lpcMaxValueNameLen */
2694 NULL, /* lpcMaxValueLen */
2695 NULL, /* lpcbSecurityDescriptor */
2696 NULL /* lpftLastWriteTime */
2700 /* Having obtained a list of all available submounts, start
2701 * searching that list for a path which matches the requested
2702 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
2703 * submount, in case we need to add a new one later.
2706 nextAutoSubmount = 1;
2708 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
2709 char submountPath[MAX_PATH] = "";
2710 DWORD submountPathLen = sizeof(submountPath);
2711 char submountName[MAX_PATH];
2712 DWORD submountNameLen = sizeof(submountName);
2715 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
2716 &dwType, submountPath, &submountPathLen);
2717 if (dwType == REG_EXPAND_SZ) {
2719 StringCbCopyA(buf, MAX_PATH, submountPath);
2720 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
2721 if (submountPathLen > MAX_PATH)
2725 /* If this is an Auto### submount, remember its ### value */
2726 if ((!strnicmp (submountName, "auto", 4)) &&
2727 (isdigit (submountName[strlen("auto")]))) {
2728 int thisAutoSubmount;
2729 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
2730 nextAutoSubmount = max (nextAutoSubmount,
2731 thisAutoSubmount+1);
2734 if ((submountPathLen == 0) ||
2735 (submountPathLen == sizeof(submountPath) - 1)) {
2739 /* See if the path for this submount matches the path
2740 * that our caller specified. If so, we can return
2743 if (!strcmp (submountPath, afspath)) {
2744 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
2745 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2746 RegCloseKey(hkSubmounts);
2747 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2753 /* We've been through the entire list of existing submounts, and
2754 * didn't find any which matched the specified path. So, we'll
2755 * just have to add one. Remember not to write the leading "/afs"
2756 * when writing out the submount.
2759 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
2761 RegSetValueEx( hkSubmounts,
2765 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2766 &afspath[strlen(cm_mountRoot)]:"/",
2767 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2768 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2770 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2771 RegCloseKey(hkSubmounts);
2772 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2777 * VIOC_GETRXKCRYPT internals.
2779 * Assumes that pioctl path has been parsed or skipped.
2782 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2784 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
2785 ioctlp->outDatap += sizeof(cryptall);
2791 * VIOC_SETRXKCRYPT internals.
2793 * Assumes that pioctl path has been parsed or skipped.
2796 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2798 afs_int32 c = cryptall;
2800 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
2802 if (c != cryptall) {
2804 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
2806 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
2812 * VIOC_RXSTAT_PROC internals.
2814 * Assumes that pioctl path has been parsed or skipped.
2817 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
2822 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2823 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2826 if (flags & AFSCALL_RXSTATS_ENABLE) {
2827 rx_enableProcessRPCStats();
2829 if (flags & AFSCALL_RXSTATS_DISABLE) {
2830 rx_disableProcessRPCStats();
2832 if (flags & AFSCALL_RXSTATS_CLEAR) {
2833 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
2839 * VIOC_RXSTAT_PEER internals.
2841 * Assumes that pioctl path has been parsed or skipped.
2844 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
2849 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2850 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2853 if (flags & AFSCALL_RXSTATS_ENABLE) {
2854 rx_enablePeerRPCStats();
2856 if (flags & AFSCALL_RXSTATS_DISABLE) {
2857 rx_disablePeerRPCStats();
2859 if (flags & AFSCALL_RXSTATS_CLEAR) {
2860 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
2866 * VIOC_UNICODECTL internals.
2868 * Assumes that pioctl path has been parsed or skipped.
2871 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
2873 afs_int32 result = 0;
2877 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2880 /* Setting the Unicode flag */
2883 newflag = ((cmd & 1) == 1);
2885 InterlockedExchange(&smb_UseUnicode, newflag);
2888 result = smb_UseUnicode;
2893 memcpy(ioctlp->outDatap, &result, sizeof(result));
2894 ioctlp->outDatap += sizeof(result);
2900 * VIOC_UUIDCTL internals.
2902 * Assumes that pioctl path has been parsed or skipped.
2905 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
2910 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2912 if (cmd) { /* generate a new UUID */
2913 UuidCreate((UUID *) &uuid);
2914 cm_data.Uuid = uuid;
2915 cm_ForceNewConnectionsAllServers();
2918 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
2919 ioctlp->outDatap += sizeof(cm_data.Uuid);
2927 * functions to dump contents of various structures.
2928 * In debug build (linked with crt debug library) will dump allocated but not freed memory
2930 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
2931 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
2934 * VIOC_TRACEMEMDUMP internals.
2936 * Assumes that pioctl path has been parsed or skipped.
2937 * dscp is held but not locked.
2940 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
2942 afs_int32 inValue = 0;
2944 char logfileName[MAX_PATH+1];
2949 static _CrtMemState memstate;
2952 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
2954 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
2955 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
2957 GetWindowsDirectory(logfileName, sizeof(logfileName));
2959 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
2961 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
2967 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
2968 ioctlp->outDatap += sizeof(afs_int32);
2973 SetFilePointer(hLogFile, 0, NULL, FILE_END);
2975 cookie = inValue ? "b" : "e";
2981 _CrtMemCheckpoint(&memstate);
2985 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
2986 _CrtSetReportFile(_CRT_WARN, hLogFile);
2987 _CrtMemDumpAllObjectsSince(&memstate);
2991 /* dump all interesting data */
2992 cm_MemDumpDirStats(hLogFile, cookie, 1);
2993 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
2994 cm_DumpCells(hLogFile, cookie, 1);
2995 cm_DumpVolumes(hLogFile, cookie, 1);
2996 cm_DumpSCache(hLogFile, cookie, 1);
2997 cm_DumpBufHashTable(hLogFile, cookie, 1);
2998 smb_DumpVCP(hLogFile, cookie, 1);
3000 CloseHandle(hLogFile);
3002 inValue = 0; /* success */
3003 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3004 ioctlp->outDatap += sizeof(long);
3009 /* Utility functon. Not currently used. */
3011 cm_CheckServersStatus(cm_serverRef_t *serversp)
3014 cm_serverRef_t *tsrp;
3016 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1;
3018 if (serversp == NULL) {
3019 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_ALLDOWN);
3020 return CM_ERROR_ALLDOWN;
3023 lock_ObtainRead(&cm_serverLock);
3024 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3025 if (tsp = tsrp->server) {
3026 cm_GetServerNoLock(tsp);
3027 lock_ReleaseRead(&cm_serverLock);
3028 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3030 if (tsrp->status == srv_busy) {
3033 } else if (tsrp->status == srv_offline) {
3043 lock_ObtainRead(&cm_serverLock);
3044 cm_PutServerNoLock(tsp);
3047 lock_ReleaseRead(&cm_serverLock);
3050 code = CM_ERROR_ALLDOWN;
3052 code = CM_ERROR_ALLBUSY;
3053 else if (allOffline || (someBusy && someOffline))
3054 code = CM_ERROR_ALLOFFLINE;
3057 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3062 * VIOC_PATH_AVAILABILITY internals.
3064 * Assumes that pioctl path has been parsed or skipped.
3065 * scp is held but not locked.
3068 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3073 cm_vol_state_t *statep;
3076 #ifdef AFS_FREELANCE_CLIENT
3077 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3082 volume = scp->fid.volume;
3084 cellp = cm_FindCellByID(scp->fid.cell, 0);
3087 return CM_ERROR_NOSUCHCELL;
3089 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3093 statep = cm_VolumeStateByID(tvp, volume);
3094 switch (statep->state) {
3100 code = CM_ERROR_ALLBUSY;
3103 code = CM_ERROR_ALLOFFLINE;
3106 code = CM_ERROR_ALLDOWN;
3115 * VIOC_VOLSTAT_TEST internals.
3117 * Assumes that pioctl path has been parsed or skipped.
3120 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3123 cm_cell_t *cellp = NULL;
3125 cm_vol_state_t *statep;
3126 struct VolStatTest * testp;
3129 testp = (struct VolStatTest *)ioctlp->inDatap;
3131 #ifdef AFS_FREELANCE_CLIENT
3132 if (testp->fid.cell == -1)
3133 return CM_ERROR_NOACCESS;
3136 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3137 cm_CheckOfflineVolumes();
3141 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3142 cm_VolStatus_Network_Started(cm_NetbiosName
3150 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3151 cm_VolStatus_Network_Stopped(cm_NetbiosName
3159 if (testp->cellname[0]) {
3160 n = atoi(testp->cellname);
3162 testp->fid.cell = n;
3164 cellp = cm_GetCell(testp->cellname, 0);
3167 if (testp->fid.cell > 0) {
3168 cellp = cm_FindCellByID(testp->fid.cell, 0);
3172 return CM_ERROR_NOSUCHCELL;
3174 if (testp->volname[0]) {
3175 n = atoi(testp->volname);
3177 testp->fid.volume = n;
3179 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3182 if (testp->fid.volume > 0)
3183 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3188 if (testp->fid.volume)
3189 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3191 statep = cm_VolumeStateByName(volp, testp->volname);
3194 statep->state = testp->state;
3195 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);